The Smartcrypt Enterprise Manager (SEM) offers administrators a view of all the devices that have connected to their Smartcrypt environment. The default view will only show 10 devices, but the view can be altered to change how many devices are displays on the screen within a single view. This view also allows an administrator the ability to disable a device. This functionality is essentially a kill switch for a device that has been lost or stolen. After a device has been disabled it will not be able to access any of the Smartkeys to decrypt and type of encrypted data on the device.
Use the search tool to identify the device you want to view. To view all devices, click Search without entering data. To identify a device to disable, fill in at least one field before searching.
Column | Description |
---|
Device | The device column will track the name of the device that reported. This may be the name of the Windows system typically defined by a system administrator, or it may be the name of an iDevice that the user defines themselves. |
---|
Enabled | Click the text to toggle (Enabled/Disabled). When a device is enabled, it is allowed to connect and synchronize keys with the Smartcrypt Manager. |
---|
Platform | The operating system for the device |
---|
Application Name |
|
---|
Application Version |
|
---|
Owner Name | This is the name for the user who has logged into a device. |
---|
Owner Email | This is the email address for the user who has logged into a device. |
---|
Last Accessed After | Date the device last connected to and authenticated with Smartcrypt Enterprise Manager. The last accessed date can be helpful in determining activity if there are duplicate entries, such as one user with multiple devices called iPhone. |
---|
Last Accessed Before |
|
---|
Last IP | The IP address associated with the device when it last connected to and authenticated with SEM. |
---|
URN | Smartcrypt generates a unique Universal Resource Name (URN) for each registered device. No two devices will have the same URN. This URN can help identifying issues with the PKWARE support team, and also when researching the data provided in Data Security Intelligence reporting. This is the name email address for the user who has logged into a device. |
---|